Analysis

  • max time kernel
    130s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    25-01-2024 07:00

General

  • Target

    7407ebae76e8efdb612ecfc1a2dabae5.dll

  • Size

    288KB

  • MD5

    7407ebae76e8efdb612ecfc1a2dabae5

  • SHA1

    4deda4e22c93c386b5797e5ec0d0d8ece5d57edb

  • SHA256

    733b5454bb650976c3f364638100c2e222c221dfe510ed771493d184522449bb

  • SHA512

    00e4d6cd880ad48e906a436db24a0e299a492b2d454082d90cae2f57595769dd8425a1127953264e6a7cde53162ab8b5f5925c96d3a25ffff5e800a39bfc3aad

  • SSDEEP

    3072:p6QlU5T0+vk+wYDgN3XwmbvV4Ynnbe9rhNifQMpnIjZ9jAPUn4CbwKL0Fo3dgqT3:pXEwZSZeKZVA6BNL0F1h31eMgIfG

Malware Config

Extracted

Family

bazarloader

C2

128.199.54.51

161.35.152.204

161.35.95.166

whitestorm9p.bazar

yellowdownpour81.bazar

Signatures

  • Bazar Loader

    Detected loader normally used to deploy BazarBackdoor malware.

  • Bazar/Team9 Loader payload 4 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\7407ebae76e8efdb612ecfc1a2dabae5.dll
    1⤵
      PID:2268
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\7407ebae76e8efdb612ecfc1a2dabae5.dll,StartW {BAB37A96-3591-441F-8EB7-A8D16E1ED9BF}
      1⤵
        PID:2040

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/2040-1-0x0000000001D60000-0x0000000001E3C000-memory.dmp

        Filesize

        880KB

      • memory/2040-2-0x0000000001D60000-0x0000000001E3C000-memory.dmp

        Filesize

        880KB

      • memory/2268-0-0x0000000001FB0000-0x000000000208C000-memory.dmp

        Filesize

        880KB

      • memory/2268-3-0x0000000001FB0000-0x000000000208C000-memory.dmp

        Filesize

        880KB